Featured article
Glasswall, an industry-leading provider of intelligent zero-trust file protection solutions in both the business-to-government (B2G), and business-to-business (B2B) sectors, today announced a strategic growth investment from PSG Equity, a leading growth equity firm that specializes in partnering with software and technology-enabled services companies to drive transformational growth.

How to protect your organization against file-based threats with Glasswall Meteor
So, you want to keep your organization secure from file-based threats, but don’t have the time to deal with complicated security deployments and can’t accept the protect gaps left by detection-based solutions? Don’t worry — we have you covered.

Analyzing the rise of ransomware: How Glasswall CDR delivers proactive zero-trust protection
In the digital era, ransomware has evolved into a sophisticated and formidable threat to global cybersecurity. Recent insights from the UK’s National Cyber Security Centre (NCSC) and initiatives like the White House's International Counter Ransomware Initiative (CRI) highlight the complexity of this ongoing challenge.

Synchronous vs Asynchronous APIs: discover the deployment mode that's right for you
APIs (Application Programming Interfaces) play a crucial role in enabling communication between different software components or systems. Glasswall Halo allows customers to choose between either a synchronous or asynchronous API mode of operation.

Integrate Glasswall’s CDR technology into Amazon S3
Glasswall’s industry-leading Content Disarm and Reconstruction (CDR) technology enables security teams to quickly and effortlessly protect their organizations against file-based threats in a variety of different scenarios.
One such use case is the protection of AWS Amazon Simple Storage Service (S3) buckets, which are at high risk of malware attacks.

Boost your Hardsec deployments with turbocharged, zero-trust CDR file protection
The quest for truly robust security is like hunting for the Holy Grail. For instance, security based solely on hardware offers huge potential to provide solutions that robustly protect a trust boundary. Yet, this has practical challenges, such as its potential to limit the processing of complex data structures, thereby affecting usability.